Which of the following would a security analyst use to determine if other companies in the same sector have
seen similar malicious activity against their systems?
A. Vulnerability scanner
B. Open-source intelligence
C. Packet capture
D. Threat feeds
seen similar malicious activity against their systems?
A. Vulnerability scanner
B. Open-source intelligence
C. Packet capture
D. Threat feeds